Sort by
Refine Your Search
-
Listed
-
Category
-
Employer
-
Field
-
associated threats. The research project of the PhD student will thus focus on defining methods to track, monitor, and manage the use of GenAI. While this can rely on recentely proposed telemetry framework
-
The doctoral researcher will be working under the supervision of Professor Thomas Mastrullo. The doctoral researcher’s main task will be to prepare a doctoral thesis in the field of business law
-
professors Copies of diplomas, transcripts with grades (English translation is required) Proof of English language proficiency (if available) The motivation letter should identify up to two EICCA research
-
The doctoral researcher will be working under the supervision of Professor Picard. The doctoral researcher’s main task will be to prepare a doctoral thesis in the field of Quantitative Urban and/or
-
procedure law, ideally in connection with its European, international and interdisciplinary aspects. The doctoral researcher will be working under the supervision of Professor Stefan Braum. The thesis work
-
to teacher education. The PhD candidate will co-design and implement participatory biodiversity school actions together with teachers and pupils, and will work as a part of a dynamic research and teacher
-
The SnT is seeking a Doctoral Researcher to support the research and development work within the SEDAN group (https://www.uni.lu/snt-en/research-groups/sedan ). We seek a candidate with expertise
-
triggering and exacerbating disease processes. Within MICRO-PATH, the Systems Ecology group at the LCSB has an immediate opening for a highly motivated and talented doctoral candidate to work on the resolution
-
management to improve the performance of the future wireless communication systems. Finally, due to the large-scale nature, complexity, and heterogeneity of 6G networks, for their analysis and optimization, we
-
for democracy, for people’s safety and the proper functioning of public (e.g., hospitals) and private institutions (e.g., banks). Effective cybersecurity requires expertise both in social and in technical domains